-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
preferred_client_mode always otp in polling mode #150
Comments
That is the intended behavior. What is the problem? |
The feature is experimental, we are testing if this has any benefit for users/admins and how it is used. If it does not have any, we will remove it and not implement it elsewhere. |
I am acknowledge that this is an experimental feature and this is actually the reason why I am testing it and reporting issues so soon. We are very excited for this to work and we aim for using this polling mode as a basis of the intuitive (button) token selection implementation. Getting rid of switching between polling and otp modes is very feasible. You mention problem 1 being "my" problem. Is the polling mode intended to be used with Same Origin Policy being turned off? This would make the keycloak instance vulnerable to XSS, or am I mistaken? Do you test it without Same Origin Policy? Is there any technical or fundamental reason, why it does not correctly respect "preferred_client_mode" or is it simply not implemented (yet) ? |
Since i am not an admin or webdev, i do not know that much about network setups etc. I think depending on your domains, you would not need to "disable" (rather adjust) the CORS settings, because it would not be cross-origin. This is not something we can get around if we want the browser of the user to access privacyidea directly. So you either have to setup your infrastructure in a way that it works, which might be stupid in some cases, or you have to adjust the CORS settings (e.g. to allow GET requests from a users browser, maybe identified by IP range). The reason |
After configuring it on the privacyIDEA webserver side, the polling mode works. Sorry for confusion, i confused it with "Origin" keycloak client setting, which is related to the client resources access, not to the actual login process. Nothing is also required to turn off, just enable the keycloak server as an origin, like you said. Of course you need to enable mod_headers for that to work. Thanks for the hint. The new mode is awesome, by the way! :) I guess we now need #137 for the UI to not look like this: I.e. something like "Please accept login with your device, or enter OTP:" would be nice. Question is how to do it translatable? Or maybe just rename "Alternate login methods" to "Or please accept login with your device/alternate login method". Thanks for explaining the fallback mode and it absolutely makes sense to fix/improve it after 1.3.0. I must say the 1.3.0 is starting to shape pretty nicely, so far by the way! :) Thanks. |
The message is directly taken from the response from privacyidea. It should be configurable there somehow, but it probably will still put an |
Showing the JSON token messages is the correct way I think, that way internationalization works (well, once privacyidea fixes that ) However, in the JSON there are 3 messages:
In the UI, you can see only 2 of them (the OTP ones). The 2) message is not displayed at all. Also, what about the "Alternate login methods" text? This one is not from the JSON and does not make sense in the browser-polling mode. |
There might be webauthn, but the text should only be shown when there is. We will need to improve the UI stuff, maybe unify it for everything that uses HTML/js, since there is alot more going on now than just 3 input fields. |
Hello,
I know this is fast :) but with latest patches for the polling mode and Keycloak 22.0.1, the default UI is always the OTP one.
If I turn off the polling mode #133 in settings, it correctly shows preferred mode, which is currently poll (PUSH).
Let me know if you need any other info.
The text was updated successfully, but these errors were encountered: